Author of the publication

scc: cluster storage provisioning informed by application characteristics and SLAs.

, , , , , , and . FAST, page 23. USENIX Association, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Stefan Oechsle University of Stuttgart

Endpoint Architecture for Distributed Real-Time Applications Based on TSN, , , , and . 2024 IEEE 20th International Conference on Factory Communication Systems (WFCS), page 41-48. (April 2024)

Univ. -Prof. Dr. -Ing. Stefan Tenbohlen University of Stuttgart

Measurement and Simulation of the Shielding Effectiveness of Planar Material with Apertures using a ASTM D4935 TEM Cell, , and . 2023 International Symposium on Electromagnetic Compatibility : EMC Europe, IEEE, (2023)
Measurement and Simulation of the Shielding Effectiveness of Planar Material with Apertures using a ASTM D4935 TEM Cell, , and . 2023 International Symposium on Electromagnetic Compatibility : EMC Europe, IEEE, (2023)Measurement System for Surface Potentials in Realistic HVDC-GIS Environments, , , and . 23rd International Symposium on High Voltage Engineering (ISH 2023), page 543-547. Stevenage, Institution of Engineering and Technology, (2023)Using capacitive electric field sensors to measure transient overvoltages : a case study, , , , and . 23rd International Symposium on High Voltage Engineering (ISH 2023), page 20-25. Stevenage, Institution of Engineering and Technology, (2023)
 

Other publications of authors with the same name

On the empirical performance of self-calibrating WiFi location systems., , and . LCN, page 76-84. IEEE Computer Society, (2011)BlueSky: a cloud-backed file system for the enterprise., , and . FAST, page 19. USENIX Association, (2012)AFRAID - A Frequently Redundant Array of Independent Disks., and . USENIX Annual Technical Conference, page 27-39. USENIX Association, (1996)PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs., , , , , , , , and . USENIX Security Symposium, page 1-16. USENIX Association, (2012)You've Got Vulnerability: Exploring Effective Vulnerability Notifications., , , , , , , and . USENIX Security Symposium, page 1033-1050. USENIX Association, (2016)Too LeJIT to Quit: Extending JIT Spraying to ARM., , and . NDSS, The Internet Society, (2015)A fistful of Bitcoins: characterizing payments among men with no names., , , , , , and . Commun. ACM, 59 (4): 86-93 (2016)Difference engine: harnessing memory redundancy in virtual machines., , , , , , , and . Commun. ACM, 53 (10): 85-93 (2010)Automating cross-layer diagnosis of enterprise wireless networks., , , , , , , and . SIGCOMM, page 25-36. ACM, (2007)Xl: an efficient network routing algorithm., , , and . SIGCOMM, page 15-26. ACM, (2008)